Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

SYN scanning requires a fully established TCP connection and is recorded in system logs.

A.

TRUE

B.

FALSE

In SSL VPN, the firewall performs access authorization and control based on which of the following dimensions?

A.

Role

B.

MAC address

C.

Port number

D.

IP address

Which of the following statements is true about the incoming traffic in the firewall virtualsystem?(Select All that Apply)

A.

Traffic from the public network interface to the private network interface is limited by the outbound bandwidth.

B.

Traffic from the public network interface to the private network interface is limited by the inbound bandwidth.

C.

Traffic from the private network interface to the public network interface is limited by the inbound bandwidth.

D.

Traffic from the private network interface to the public network interface is limited by the outbound bandwidth.

IPsec VPN does not support encapsulation of non-IP unicast packets.

A.

TRUE

B.

FALSE

When an IPsec VPN is established in aggressive mode, AH+ESP can be used to encapsulate packets in NAT traversal scenarios.

A.

TRUE

B.

FALSE

Which of the following methods are used by flood attacks to cause denial of services?(Select All that Apply)

A.

Exhaust available bandwidth.

B.

Exhaust server-side resources.

C.

Control network host rights.

D.

Exhaust network device resources.

Which of the following statements is false about the ATIC system architecture?

A.

SecoManager functions as the management center and uses the Browser/Server architecture.

B.

The ATIC consists of the management server, collector, and controller.

C.

One management center can centrally manage multiple geographically dispersed detecting and cleaning devices.

D.

The ATIC management server manages detecting and cleaning devices.

In the figure, enterprise A and enterprise B need to communicate securely, and an IPsec tunnel is established between firewall A and firewall B. Which of the following security protocols and encapsulation modes can meet the requirements of this scenario?

A.

AH+ESP; transport mode

B.

ESP; tunnel mode

C.

ESP; transport mode

D.

AH; tunnel mode

Which of the following actions can be performed when the firewall identifies file anomalies?(Select All that Apply)

A.

Alarm

B.

Allow

C.

Block

D.

Delete attachment

Predefined URL categories on Huawei firewalls reside in the URL category database delivered with the device and do not need to be manually loaded.

A.

TRUE

B.

FALSE